Page Time: 0.0792s

Memory: 10.7020 MB (Peak: 11.9921 MB)

Queries (12, time: 0.0064s, 8.0%)

  1. SELECT data_key, data_value
    FROM xf_data_registry
    WHERE data_key IN ('options', 'languages', 'contentTypes', 'codeEventListeners', 'deferredRun', 'simpleCache', 'addOns', 'defaultStyleProperties', 'routeFiltersIn', 'routeFiltersOut', 'routesPublic', 'nodeTypes', 'bannedIps', 'discouragedIps', 'styles', 'displayStyles', 'userBanners', 'smilies', 'bbCode', 'threadPrefixes', 'userTitleLadder', 'reportCounts', 'moderationCounts', 'userModerationCounts', 'notices', 'userFieldsInfo')
    Run Time: 0.000657
    Select TypeTableTypePossible KeysKeyKey LenRefRowsExtra
    SIMPLExf_data_registryrangePRIMARYPRIMARY27 26Using where
  2. SELECT data_key, data_value
    FROM xf_data_registry
    WHERE data_key IN ('brListenerClasses', 'brBriviumAddOns')
    Run Time: 0.000150
    Select TypeTableTypePossible KeysKeyKey LenRefRowsExtra
    SIMPLExf_data_registryrangePRIMARYPRIMARY27 2Using where
  3. SELECT *
    FROM xf_brivium_addon
    ORDER BY addon_id
    Run Time: 0.000141
    Select TypeTableTypePossible KeysKeyKey LenRefRowsExtra
    SIMPLExf_brivium_addonindex PRIMARY77 1 
  4. INSERT INTO xf_data_registry
    	(data_key, data_value)
    VALUES
    	(?, ?)
    ON DUPLICATE KEY UPDATE
    	data_value = VALUES(data_value)
    Params: brBriviumAddOns, a:0:{}
    Run Time: 0.000133
  5. SELECT cache_value
    FROM xf_permission_combination
    WHERE permission_combination_id = ?
    Params: 1
    Run Time: 0.000156
    Select TypeTableTypePossible KeysKeyKey LenRefRowsExtra
    SIMPLExf_permission_combinationconstPRIMARYPRIMARY4const1 
  6. SELECT thread.*
    	,
    		user.gender, user.avatar_date, user.gravatar,
    		NULL AS thread_read_date,
    		0 AS thread_reply_banned,
    		0 AS thread_is_watched,
    		'' AS draft_message, NULL AS draft_extra
    FROM xf_thread AS thread
    
    		LEFT JOIN xf_user AS user ON
    			(user.user_id = thread.user_id)
    WHERE thread.thread_id = ?
    Params: 282022
    Run Time: 0.000474
    Select TypeTableTypePossible KeysKeyKey LenRefRowsExtra
    SIMPLEthreadconstPRIMARYPRIMARY4const1 
    SIMPLEuserconstPRIMARYPRIMARY4const1 
  7. SELECT node.*, forum.*
    	,
    	permission.cache_value AS node_permission_cache,
    		NULL AS forum_read_date
    FROM xf_forum AS forum
    INNER JOIN xf_node AS node ON (node.node_id = forum.node_id)
    
    	LEFT JOIN xf_permission_cache_content AS permission
    		ON (permission.permission_combination_id = 1
    			AND permission.content_type = 'node'
    			AND permission.content_id = forum.node_id)
    WHERE node.node_id = ?
    Params: 38
    Run Time: 0.000473
    Select TypeTableTypePossible KeysKeyKey LenRefRowsExtra
    SIMPLEforumconstPRIMARYPRIMARY4const1 
    SIMPLEnodeconstPRIMARYPRIMARY4const1 
    SIMPLEpermissionconstPRIMARYPRIMARY35const,const,const1 
  8. SELECT post.*
    	,
    		thread.*, thread.user_id AS thread_user_id, thread.username AS thread_username,
    		thread.post_date AS thread_post_date,
    		post.user_id, post.username, post.post_date,
    		bb_code_parse_cache.parse_tree AS message_parsed, bb_code_parse_cache.cache_version AS message_cache_version,
    		user.*, IF(user.username IS NULL, post.username, user.username) AS username,
    		user_profile.*,
    		user_privacy.*,
    		signature_parse_cache.parse_tree AS signature_parsed, bb_code_parse_cache.cache_version AS signature_cache_version,
    		session_activity.view_date AS last_view_date,
    		0 AS like_date
    FROM xf_post AS post
    
    		INNER JOIN xf_thread AS thread ON
    			(thread.thread_id = post.thread_id)
    		LEFT JOIN xf_bb_code_parse_cache AS bb_code_parse_cache ON
    			(bb_code_parse_cache.content_type = 'post' AND bb_code_parse_cache.content_id = post.post_id)
    		LEFT JOIN xf_user AS user ON
    			(user.user_id = post.user_id)
    		LEFT JOIN xf_user_profile AS user_profile ON
    			(user_profile.user_id = post.user_id)
    		LEFT JOIN xf_user_privacy AS user_privacy ON
    			(user_privacy.user_id = post.user_id)
    		LEFT JOIN xf_bb_code_parse_cache AS signature_parse_cache ON
    			(signature_parse_cache.content_type = 'signature' AND signature_parse_cache.content_id = post.user_id)
    		LEFT JOIN xf_session_activity AS session_activity ON
    			(post.user_id > 0 AND session_activity.user_id = post.user_id AND session_activity.unique_key = CAST(post.user_id AS BINARY))
    WHERE (
    		(post.thread_id = ?  AND (post.position >= 0 AND post.position < 10) )
    		
    		
    	)
    	AND (post.message_state IN ('visible'))
    ORDER BY post.position ASC, post.post_date ASC
    Params: 282022
    Run Time: 0.001601
    Select TypeTableTypePossible KeysKeyKey LenRefRowsExtra
    SIMPLEthreadconstPRIMARYPRIMARY4const1Using filesort
    SIMPLEpostrefthread_id_post_date,thread_id_positionthread_id_post_date4const1Using index condition; Using where
    SIMPLEbb_code_parse_cacheeq_refcontent_type_idcontent_type_id31const,xenforo.cc.post.post_id1Using where
    SIMPLEusereq_refPRIMARYPRIMARY4xenforo.cc.post.user_id1 
    SIMPLEuser_profileeq_refPRIMARYPRIMARY4xenforo.cc.post.user_id1 
    SIMPLEuser_privacyeq_refPRIMARYPRIMARY4xenforo.cc.post.user_id1 
    SIMPLEsignature_parse_cacheeq_refcontent_type_idcontent_type_id31const,xenforo.cc.post.user_id1Using where
    SIMPLEsession_activityeq_refPRIMARYPRIMARY22xenforo.cc.post.user_id,func1Using where
  9. INSERT  INTO xf_thread_view
    	(thread_id)
    VALUES
    	(?)
    Params: 282022
    Run Time: 0.000088
  10. INSERT INTO `xf_session` (`session_id`, `session_data`, `expiry_date`) VALUES (?, ?, ?)
    Params: 66d076c347525536b19c2b9b671be8bb, , 1714297499
    Run Time: 0.001004
  11. INSERT INTO xf_session_activity
    	(user_id, unique_key, ip, controller_name, controller_action, view_state, params, view_date, robot_key)
    VALUES
    	(?, ?, ?, ?, ?, ?, ?, ?, ?)
    ON DUPLICATE KEY UPDATE
    	ip = VALUES(ip),
    	controller_name = VALUES(controller_name),
    	controller_action = VALUES(controller_action),
    	view_state = VALUES(view_state),
    	params = VALUES(params),
    	view_date = VALUES(view_date),
    	robot_key = VALUES(robot_key)
    Params: 0, , , XenForo_ControllerPublic_Thread, Index, valid, thread_id=282022, 1714293899,
    Run Time: 0.000104
  12. INSERT INTO xf_bb_code_parse_cache
    	(content_type, content_id, parse_tree, cache_version, cache_date)
    VALUES (?, ?, ?, ?, ?)
    ON DUPLICATE KEY UPDATE parse_tree = VALUES(parse_tree),
    	cache_version = VALUES(cache_version),
    	cache_date = VALUES(cache_date)
    Params: post, 288229, a:96:{i:0;s:128:"解题要求:使用数学方法、不能借助第六人、选用的方法有一定防止作弊和少数人串通的能力。 ";i:1;a:4:{s:3:"tag";s:3:"img";s:6:"option";N;s:8:"original";a:2:{i:0;s:5:"[IMG]";i:1;s:6:"[/IMG]";}s:8:"children";a:1:{i:0;s:61:"http://pic2.zhimg.com/4109864a6d5a521ea72629db1bc84ea1_is.jpg";}}i:2;s:429:" 王希,IIE 密码学,喜欢数学 作为一个密码学学渣,这个问题引起了我极大的兴趣,想从相对专业一点的角度聊一聊。答案较长,分为以下几个部分:第一部分介绍一些基本概念和讨论的大前提,第二部分分析目前知友们提出的方案,第三部分基于一位知友的答案进行改进,第四部分讨论几何均值的情况,第五部分总结。 ";i:3;a:4:{s:3:"tag";s:1:"b";s:6:"option";N;s:8:"original";a:2:{i:0;s:3:"[B]";i:1;s:4:"[/B]";}s:8:"children";a:1:{i:0;a:4:{s:3:"tag";s:1:"b";s:6:"option";N;s:8:"original";a:2:{i:0;s:3:"[B]";i:1;s:4:"[/B]";}s:8:"children";a:1:{i:0;s:12:"一、介绍";}}}}i:4;s:1347:" 在一个有信息需要保密的过程中,我们应该如何考虑消息的安全性?主要分为两个方面: 第一是消息的保密性。也就是说,要尽量保证不该知道这个消息的人不能知道与消息相关的信息(注意是信息而非内容。内容是指完整地掌握所有的信息,而信息则是与之相关的东西,比如最后一个比特,二进制中 1 的个数等等。这些信息的泄露也是需要避免的)。 第二是消息的可靠性。也就是说,A 收到了 B 发出的消息,他应该有办法验证这条消息确实是 B 发出的,而不是中间人掉包后的消息。 在研究一个协议的安全性时,我们经常构造一个“游戏(game)”,游戏中有两方:敌手和挑战者。挑战者进行保密通信,而敌手则需要窃取秘密或破坏通信。根据不同的假设,我们给予敌手一些能力,同时对通信消息的保密性和可靠性做一些要求。最后,我们考虑在面对有这种能力的敌手时,需要的保密性和可靠性是否能够达到要求。 具体到这个问题中,我们先讨论一些大前提,再讨论其他知友给出的方案的安全性,构造一些攻击,最后提出一个相对来说安全性较高的方案。为了一般性,我们直接讨论 n 个人的情况。 ";i:5;a:4:{s:3:"tag";s:6:"indent";s:6:"option";N;s:8:"original";a:2:{i:0;s:8:"[INDENT]";i:1;s:9:"[/INDENT]";}s:8:"children";a:2:{i:0;a:4:{s:3:"tag";s:1:"b";s:6:"option";N;s:8:"original";a:2:{i:0;s:3:"[B]";i:1;s:4:"[/B]";}s:8:"children";a:1:{i:0;s:11:"大前提 1";}}i:1;s:108:":所有的节点必须是诚实的。也就是说,每个人提供自己的工资信息时不能撒谎。";}}i:6;s:397:" 说明:这是一个很不现实但又必须做的假设。原因很简单:如果有且只有一个节点撒谎,那么他将获得其他四个人的平均工资,同时其他四个人不知道五个人的平均工资,且完全无法验证;如果有至少两个人撒谎,那么没有人可以同时知道所有人的平均工资。无论如何,整个协议将变得没有意义。 ";i:7;a:4:{s:3:"tag";s:6:"indent";s:6:"option";N;s:8:"original";a:2:{i:0;s:8:"[INDENT]";i:1;s:9:"[/INDENT]";}s:8:"children";a:2:{i:0;a:4:{s:3:"tag";s:1:"b";s:6:"option";N;s:8:"original";a:2:{i:0;s:3:"[B]";i:1;s:4:"[/B]";}s:8:"children";a:1:{i:0;s:11:"大前提 2";}}i:1;s:83:":最坏的情况下只有 n-2 个节点进行合谋,攻击其余两个节点。";}}i:8;s:353:" 因为如果 n-1 个节点攻击另外一个节点,无论如何都一定成功。(注: n-1 个节点如果可以合谋,可以在这 n-1 个节点不泄露自己工资的情况下得到剩下一个人的工资,这是一个递归的过程。简单起见,我们不允许这样的攻击。虽然 @Pegasus 的答案讨论了这样的攻击) ";i:9;a:4:{s:3:"tag";s:6:"indent";s:6:"option";N;s:8:"original";a:2:{i:0;s:8:"[INDENT]";i:1;s:9:"[/INDENT]";}s:8:"children";a:2:{i:0;a:4:{s:3:"tag";s:1:"b";s:6:"option";N;s:8:"original";a:2:{i:0;s:3:"[B]";i:1;s:4:"[/B]";}s:8:"children";a:1:{i:0;s:11:"大前提 3";}}i:1;s:54:":他们只能靠互相交流信息来获得答案。";}}i:10;s:106:" 也就是说,没有一个可信第三方来帮助计算。这个要求否决了找会计等答案。 ";i:11;a:4:{s:3:"tag";s:1:"b";s:6:"option";N;s:8:"original";a:2:{i:0;s:3:"[B]";i:1;s:4:"[/B]";}s:8:"children";a:1:{i:0;a:4:{s:3:"tag";s:1:"b";s:6:"option";N;s:8:"original";a:2:{i:0;s:3:"[B]";i:1;s:4:"[/B]";}s:8:"children";a:1:{i:0;s:18:"二、方案分析";}}}}i:12;s:64:" 下面我们分析一些知友提出的方案的安全性。 ";i:13;a:4:{s:3:"tag";s:1:"b";s:6:"option";N;s:8:"original";a:2:{i:0;s:3:"[B]";i:1;s:4:"[/B]";}s:8:"children";a:1:{i:0;s:39:"1. 扑克牌 / 麻将 / 大富翁钞票";}}i:14;s:686:" 在这些知友的方案中,每个人通过扑克牌等将自己的工资信息拆分,之后混在一起加起来求平均。由于这些牌是扣起来混合的,因此不可能知道其他人的工资。 分析:这个方法在大多数情况下可以保证自己的工资不被其他人所知,但一定会有信息泄露。比如说我们用红桃代表千位,你看到翻开后的牌里有一个红桃九,而你自己的工资只有一千多,矛盾是不是就产生了?但是如果是理想情况,你只能知道最后的平均工资,而不能知道每一个人工资的任何信息。 由于这个方案泄露了大家工资的信息,因此不可靠。 ";i:15;a:4:{s:3:"tag";s:1:"b";s:6:"option";N;s:8:"original";a:2:{i:0;s:3:"[B]";i:1;s:4:"[/B]";}s:8:"children";a:1:{i:0;s:50:"2.第一个人加上一个随机数,最后减掉";}}i:16;s:3:"(";i:17;a:4:{s:3:"tag";s:3:"url";s:6:"option";s:56:"https://www.zhihu.com/question/60042833/answer/173221097";s:8:"original";a:2:{i:0;s:64:"[URL='https://www.zhihu.com/question/60042833/answer/173221097']";i:1;s:6:"[/URL]";}s:8:"children";a:1:{i:0;s:12:"这个答案";}}i:18;s:596:") 这样的方式是符合最基本的安全要求的。也就是说,如果每个人都只知道自己的工资和传来的数字,没有人可以知道其他人的工资。 分析:这个方案几乎没有直接泄露的信息,但少数人合谋可以对某个人的工资数进行攻击。如果第一个人知道了第三个人收到的数字,他就可以知道第二个人的工资;2 号知道了 4 号收到的数字,就知道 3 号的工资……对于任意一个 n ,只需要知道前后的数字就可以算出一个人的工资,这个协议还是比较脆弱的。 ";i:19;a:4:{s:3:"tag";s:1:"b";s:6:"option";N;s:8:"original";a:2:{i:0;s:3:"[B]";i:1;s:4:"[/B]";}s:8:"children";a:1:{i:0;s:50:"3.每个人拆分自己的工资并发给其他人";}}i:20;s:3:"(";i:21;a:4:{s:3:"tag";s:3:"url";s:6:"option";s:56:"https://www.zhihu.com/question/60042833/answer/173025969";s:8:"original";a:2:{i:0;s:64:"[URL='https://www.zhihu.com/question/60042833/answer/173025969']";i:1;s:6:"[/URL]";}s:8:"children";a:1:{i:0;s:12:"这个答案";}}i:22;s:532:") 在这种情况下,任意 n-2 个人合谋也只能得到其余两人的平均工资,无法获得更多的信息。这是目前最好的方案。 但是注意,这个方案我们进行了一些假设:每个人发给其他人的信息不会被这 n 个人之外的敌手窃听,也不会被篡改。但实际中并不是这样。我们的方案应该能防止这些事情的发生。 下面,我们提出这个问题中的敌手能力和安全性要求,并对方案 3 做出改进来满足我们提出的要求。 ";i:23;a:4:{s:3:"tag";s:1:"b";s:6:"option";N;s:8:"original";a:2:{i:0;s:3:"[B]";i:1;s:4:"[/B]";}s:8:"children";a:1:{i:0;s:18:"三、方案改进";}}i:24;s:1973:" 现在我们假设这 n 个人不在一起,彼此之间只能通过计算机发送信息。而通信的信道是不可靠的,也就是说我们不能验证这条消息是不是对方发来的、没有被篡改过的,传输的信息也会被敌手得到。 而我们的要求包括两方面。第一,这 n 个人中即使有 n-2 个人合谋,也只能知道剩下 2 人的平均工资,不能获得更多的信息;第二,敌手即使可以获得所有的通信消息,也可以进行篡改。在这种情况下,敌手不能获得关于工资的任何信息,也不能篡改通信内容而不被发现。 在这里我们还要再做两点补充。第一是敌手的计算能力是有限的,这允许我们进行公钥加密和签名(这两个概念马上会具体介绍);第二是公开信息是可靠的,也就是说,我可以公开一个字符串作为我的一个“公钥”,这个公钥没有保密性,任何人都可以看到。而这种情况下这个字符串是无法伪造的,也就是所有人都可以确定我确实公开的是这段字符串。 下面我们分别介绍公钥加密和数字签名。在传输中的消息是会被敌手看到的,所以要对消息进行加密。但如果使用传统的加密方式,需要加密者和解密者拥有共同的密钥,在这种情况下是做不到的(不考虑密钥交换……这个过程还是用公钥思想实现的)。因此我们需要使用另一种加密方式:加密密钥是公开的,每个人都可以看到并使用;但解密密钥是保密的,只有消息的接受者持有。这样,当 Alice 想给 Bob 发送一条保密消息时,他只需要使用 Bob 的公钥对消息进行加密再发给 Bob ,Bob 使用解密密钥进行解密即可。 这种加密方式需要一个困难问题,大家把困难问题理解为一个敌手和挑战者都无法进行的计算问题即可。比如说离散对数问题:在一个群 G 中,";i:25;a:4:{s:3:"tag";s:3:"img";s:6:"option";N;s:8:"original";a:2:{i:0;s:5:"[IMG]";i:1;s:6:"[/IMG]";}s:8:"children";a:1:{i:0;s:43:"http://www.zhihu.com/equation?tex=g%5Ex%3Dy";}}i:26;s:18:",给出群 G 和";i:27;a:4:{s:3:"tag";s:3:"img";s:6:"option";N;s:8:"original";a:2:{i:0;s:5:"[IMG]";i:1;s:6:"[/IMG]";}s:8:"children";a:1:{i:0;s:39:"http://www.zhihu.com/equation?tex=g%2Cy";}}i:28;s:15:" 的值,求 ";i:29;a:4:{s:3:"tag";s:3:"img";s:6:"option";N;s:8:"original";a:2:{i:0;s:5:"[IMG]";i:1;s:6:"[/IMG]";}s:8:"children";a:1:{i:0;s:49:"http://www.zhihu.com/equation?tex=x%3D%5Clog+_g+y";}}i:30;s:250:"。这里的对数和我们之前讨论的不同,是在群中的。实数中的对数是容易计算的,而一般情况下,群里的离散对数是难以计算的。 另外,我们还要做一个假设(CDH 假设):在群 G 中,给出 ";i:31;a:4:{s:3:"tag";s:3:"img";s:6:"option";N;s:8:"original";a:2:{i:0;s:5:"[IMG]";i:1;s:6:"[/IMG]";}s:8:"children";a:1:{i:0;s:47:"http://www.zhihu.com/equation?tex=g%5Ea%2Cg%5Eb";}}i:32;s:10:",计算 ";i:33;a:4:{s:3:"tag";s:3:"img";s:6:"option";N;s:8:"original";a:2:{i:0;s:5:"[IMG]";i:1;s:6:"[/IMG]";}s:8:"children";a:1:{i:0;s:46:"http://www.zhihu.com/equation?tex=g%5E%7Bab%7D";}}i:34;s:107:" 是困难的。 这样,我们就可以构造一个公钥加密体制,也就是著名的 ELGamal : ";i:35;a:4:{s:3:"tag";s:6:"indent";s:6:"option";N;s:8:"original";a:2:{i:0;s:8:"[INDENT]";i:1;s:9:"[/INDENT]";}s:8:"children";a:21:{i:0;s:28:"1.Bob 找一个群(比如 ";i:1;a:4:{s:3:"tag";s:3:"img";s:6:"option";N;s:8:"original";a:2:{i:0;s:5:"[IMG]";i:1;s:6:"[/IMG]";}s:8:"children";a:1:{i:0;s:58:"http://www.zhihu.com/equation?tex=%5Cmathbb%7BZ%7D_q%5E%2A";}}i:2;s:23:" )和一个生成元 ";i:3;a:4:{s:3:"tag";s:3:"img";s:6:"option";N;s:8:"original";a:2:{i:0;s:5:"[IMG]";i:1;s:6:"[/IMG]";}s:8:"children";a:1:{i:0;s:35:"http://www.zhihu.com/equation?tex=g";}}i:4;s:12:" ,私钥为 ";i:5;a:4:{s:3:"tag";s:3:"img";s:6:"option";N;s:8:"original";a:2:{i:0;s:5:"[IMG]";i:1;s:6:"[/IMG]";}s:8:"children";a:1:{i:0;s:35:"http://www.zhihu.com/equation?tex=x";}}i:6;s:11:" ,公开 ";i:7;a:4:{s:3:"tag";s:3:"img";s:6:"option";N;s:8:"original";a:2:{i:0;s:5:"[IMG]";i:1;s:6:"[/IMG]";}s:8:"children";a:1:{i:0;s:51:"http://www.zhihu.com/equation?tex=h%3Dg%5Ex%2Cg%2Cq";}}i:8;s:11:" ,保密 ";i:9;a:4:{s:3:"tag";s:3:"img";s:6:"option";N;s:8:"original";a:2:{i:0;s:5:"[IMG]";i:1;s:6:"[/IMG]";}s:8:"children";a:1:{i:0;s:35:"http://www.zhihu.com/equation?tex=x";}}i:10;s:36:" . 2.Alice 先随机选择一个数 ";i:11;a:4:{s:3:"tag";s:3:"img";s:6:"option";N;s:8:"original";a:2:{i:0;s:5:"[IMG]";i:1;s:6:"[/IMG]";}s:8:"children";a:1:{i:0;s:35:"http://www.zhihu.com/equation?tex=y";}}i:12;s:23:" ,然后分别计算 ";i:13;a:4:{s:3:"tag";s:3:"img";s:6:"option";N;s:8:"original";a:2:{i:0;s:5:"[IMG]";i:1;s:6:"[/IMG]";}s:8:"children";a:1:{i:0;s:45:"http://www.zhihu.com/equation?tex=c_1%3Dg%5Ey";}}i:14;s:5:" 和 ";i:15;a:4:{s:3:"tag";s:3:"img";s:6:"option";N;s:8:"original";a:2:{i:0;s:5:"[IMG]";i:1;s:6:"[/IMG]";}s:8:"children";a:1:{i:0;s:54:"http://www.zhihu.com/equation?tex=c_2%3Dm%5Ccdot+h%5Ey";}}i:16;s:36:" ,将其发送给 Bob. 3.Bob 计算 ";i:17;a:4:{s:3:"tag";s:3:"img";s:6:"option";N;s:8:"original";a:2:{i:0;s:5:"[IMG]";i:1;s:6:"[/IMG]";}s:8:"children";a:1:{i:0;s:47:"http://www.zhihu.com/equation?tex=c_2%2Fc_1%5Ex";}}i:18;s:26:" ,可以验证其等于 ";i:19;a:4:{s:3:"tag";s:3:"img";s:6:"option";N;s:8:"original";a:2:{i:0;s:5:"[IMG]";i:1;s:6:"[/IMG]";}s:8:"children";a:1:{i:0;s:35:"http://www.zhihu.com/equation?tex=m";}}i:20;s:81:" ,解密成功。 (这里的描述不是很严谨,大家理解意思即可)";}}i:36;s:633:" 下面我们介绍数字签名。在现实生活中,我们经常需要对文件进行签名,证明我们已经阅读并认可该文件。类似地,在数字世界中,我们也需要对文件进行签名。签名可以防止信息的伪造:因为我们提到了,每个人可以公开一个字符串,这个字符串是可靠的,所有人都可以验证它属于你。类比公钥,你把一个消息用你的私钥进行处理,得到的值任何人都可以用你的公钥进行验证,这就达到了目的。 类似地,ELGamal 同样可以进行签名的构造。比如 Alice 要对消息 m 进行签名: ";i:37;a:4:{s:3:"tag";s:6:"indent";s:6:"option";N;s:8:"original";a:2:{i:0;s:8:"[INDENT]";i:1;s:9:"[/INDENT]";}s:8:"children";a:7:{i:0;s:29:"sAlice 随机选择 k 计算 ";i:1;a:4:{s:3:"tag";s:3:"img";s:6:"option";N;s:8:"original";a:2:{i:0;s:5:"[IMG]";i:1;s:6:"[/IMG]";}s:8:"children";a:1:{i:0;s:57:"http://www.zhihu.com/equation?tex=r%3Dg%5Ek%5Cpmod%7Bq%7D";}}i:2;s:5:" 和 ";i:3;a:4:{s:3:"tag";s:3:"img";s:6:"option";N;s:8:"original";a:2:{i:0;s:5:"[IMG]";i:1;s:6:"[/IMG]";}s:8:"children";a:1:{i:0;s:75:"http://www.zhihu.com/equation?tex=%28m-xr%29%2Ak%5E%7B-1%7D%5Cmod+%7Bq-1%7D";}}i:4;s:16:"dsis Bob 验证 ";i:5;a:4:{s:3:"tag";s:3:"img";s:6:"option";N;s:8:"original";a:2:{i:0;s:5:"[IMG]";i:1;s:6:"[/IMG]";}s:8:"children";a:1:{i:0;s:80:"http://www.zhihu.com/equation?tex=%28m-xr%29%3Dy%5Er%5Ccdot+r%5Es+%5Cpmod%7Bq%7D";}}i:6;s:61:" (公式显示不出来的话可自行搜索相关内容)";}}i:38;s:217:" 其实具体的方法不重要,大家只要知道有一种方法,可以验证一条消息是不是由某个人发送的就行了。 好了,下面我们完整地过一遍: 1.每个人的工资分别记为 ";i:39;a:4:{s:3:"tag";s:3:"img";s:6:"option";N;s:8:"original";a:2:{i:0;s:5:"[IMG]";i:1;s:6:"[/IMG]";}s:8:"children";a:1:{i:0;s:60:"http://www.zhihu.com/equation?tex=m_1%2Cm_2%2C%5Cldots%2Cm_n";}}i:40;s:65:" 2.每个人将工资随机地分解为 n 个数之和,记为 ";i:41;a:4:{s:3:"tag";s:3:"img";s:6:"option";N;s:8:"original";a:2:{i:0;s:5:"[IMG]";i:1;s:6:"[/IMG]";}s:8:"children";a:1:{i:0;s:57:"http://www.zhihu.com/equation?tex=m_%7B11%7D%2Cm_%7B12%7D";}}i:42;s:69:" 等等 3.每个人在自己分解的 n 个数随机排序,将第 ";i:43;a:4:{s:3:"tag";s:3:"img";s:6:"option";N;s:8:"original";a:2:{i:0;s:5:"[IMG]";i:1;s:6:"[/IMG]";}s:8:"children";a:1:{i:0;s:35:"http://www.zhihu.com/equation?tex=i";}}i:44;s:14:" 个数用第 ";i:45;a:4:{s:3:"tag";s:3:"img";s:6:"option";N;s:8:"original";a:2:{i:0;s:5:"[IMG]";i:1;s:6:"[/IMG]";}s:8:"children";a:1:{i:0;s:35:"http://www.zhihu.com/equation?tex=i";}}i:46;s:164:" 个人的公钥加密(如果是给自己的则省略),用自己的私钥对加密后的消息进行签名,然后将消息与加密结果一起发送给第 ";i:47;a:4:{s:3:"tag";s:3:"img";s:6:"option";N;s:8:"original";a:2:{i:0;s:5:"[IMG]";i:1;s:6:"[/IMG]";}s:8:"children";a:1:{i:0;s:35:"http://www.zhihu.com/equation?tex=i";}}i:48;s:346:" 个人 4.每个人验证签名后用自的私钥解密其余 n-1 条消息,将其与自己留下的一个数共 n 个数求和 5.把求和结果用其余 n-1 个人的公钥分别加密,并对结果签名,将加密后的消息与对应的签名发送给对应的人 6.每个人验证签名后解密所有消息,计算平均值即可 ";i:49;a:4:{s:3:"tag";s:1:"b";s:6:"option";N;s:8:"original";a:2:{i:0;s:3:"[B]";i:1;s:4:"[/B]";}s:8:"children";a:1:{i:0;s:18:"四、几何均值";}}i:50;s:720:" 在第三部分最后,我们已经给出了所有人算术平均值的方案,可以证明在加密算法和签名算法安全的情况下,这种方案也是足够安全的。下面我们讨论求几何均值的情况。 如果用类似的方法,我们需要把每个数分解为若干个数的乘积,这是很难做到的。一方面,对整数进行素因子分解本身就不是一件容易的事情;另一方面,有些整数没有足够的素因子,将 1 作为因数之一并不是一个好办法。 看来只有另寻出路了。注意到 ELGamal 加密算法中的消息是作为一个因子的,这给了我们一个提示。构造这样的算法: 1. 其中任何一个人公开一个群 ";i:51;a:4:{s:3:"tag";s:3:"img";s:6:"option";N;s:8:"original";a:2:{i:0;s:5:"[IMG]";i:1;s:6:"[/IMG]";}s:8:"children";a:1:{i:0;s:58:"http://www.zhihu.com/equation?tex=%5Cmathbb%7BZ%7D_q%5E%2A";}}i:52;s:20:" 和一个生成元 ";i:53;a:4:{s:3:"tag";s:3:"img";s:6:"option";N;s:8:"original";a:2:{i:0;s:5:"[IMG]";i:1;s:6:"[/IMG]";}s:8:"children";a:1:{i:0;s:35:"http://www.zhihu.com/equation?tex=g";}}i:54;s:31:",每个人选取一个私钥 ";i:55;a:4:{s:3:"tag";s:3:"img";s:6:"option";N;s:8:"original";a:2:{i:0;s:5:"[IMG]";i:1;s:6:"[/IMG]";}s:8:"children";a:1:{i:0;s:37:"http://www.zhihu.com/equation?tex=x_i";}}i:56;s:20:" 和一个随机数 ";i:57;a:4:{s:3:"tag";s:3:"img";s:6:"option";N;s:8:"original";a:2:{i:0;s:5:"[IMG]";i:1;s:6:"[/IMG]";}s:8:"children";a:1:{i:0;s:37:"http://www.zhihu.com/equation?tex=r_i";}}i:58;s:15:" ,公开所有 ";i:59;a:4:{s:3:"tag";s:3:"img";s:6:"option";N;s:8:"original";a:2:{i:0;s:5:"[IMG]";i:1;s:6:"[/IMG]";}s:8:"children";a:1:{i:0;s:53:"http://www.zhihu.com/equation?tex=h_i%3Dg%5E%7Bx_i%7D";}}i:60;s:24:" 2. 第一个人计算 ";i:61;a:4:{s:3:"tag";s:3:"img";s:6:"option";N;s:8:"original";a:2:{i:0;s:5:"[IMG]";i:1;s:6:"[/IMG]";}s:8:"children";a:1:{i:0;s:66:"http://www.zhihu.com/equation?tex=c_1%3Dm_1%5Ccdot+h_1%5E%7Br_1%7D";}}i:62;s:43:" ,传给第二个人 3.第二个人计算 ";i:63;a:4:{s:3:"tag";s:3:"img";s:6:"option";N;s:8:"original";a:2:{i:0;s:5:"[IMG]";i:1;s:6:"[/IMG]";}s:8:"children";a:1:{i:0;s:78:"http://www.zhihu.com/equation?tex=c-2%3Dc_1%5Ccdot+m_2+%5Ccdot+h_2%5E%7Br_2%7D";}}i:64;s:28:",以此类推,直到第 ";i:65;a:4:{s:3:"tag";s:3:"img";s:6:"option";N;s:8:"original";a:2:{i:0;s:5:"[IMG]";i:1;s:6:"[/IMG]";}s:8:"children";a:1:{i:0;s:35:"http://www.zhihu.com/equation?tex=n";}}i:66;s:32:" 个人计算完毕,将结果 ";i:67;a:4:{s:3:"tag";s:3:"img";s:6:"option";N;s:8:"original";a:2:{i:0;s:5:"[IMG]";i:1;s:6:"[/IMG]";}s:8:"children";a:1:{i:0;s:37:"http://www.zhihu.com/equation?tex=p_0";}}i:68;s:42:" 交给第一个人 4.第一个人计算 ";i:69;a:4:{s:3:"tag";s:3:"img";s:6:"option";N;s:8:"original";a:2:{i:0;s:5:"[IMG]";i:1;s:6:"[/IMG]";}s:8:"children";a:1:{i:0;s:64:"http://www.zhihu.com/equation?tex=p_1%3Dp_0%2Fg_1%5E%7Br_1x_1%7D";}}i:70;s:43:" ,交给第二个人 5.第二个人计算 ";i:71;a:4:{s:3:"tag";s:3:"img";s:6:"option";N;s:8:"original";a:2:{i:0;s:5:"[IMG]";i:1;s:6:"[/IMG]";}s:8:"children";a:1:{i:0;s:64:"http://www.zhihu.com/equation?tex=p_2%3Dp_1%2Fg_2%5E%7Br_2x_2%7D";}}i:72;s:49:",交给第三个人,以此类推,直到第 ";i:73;a:4:{s:3:"tag";s:3:"img";s:6:"option";N;s:8:"original";a:2:{i:0;s:5:"[IMG]";i:1;s:6:"[/IMG]";}s:8:"children";a:1:{i:0;s:35:"http://www.zhihu.com/equation?tex=n";}}i:74;s:102:" 个人计算完毕。公布结果,即为所有人工资的乘积 6.别忘了这里的乘积是对 ";i:75;a:4:{s:3:"tag";s:3:"img";s:6:"option";N;s:8:"original";a:2:{i:0;s:5:"[IMG]";i:1;s:6:"[/IMG]";}s:8:"children";a:1:{i:0;s:35:"http://www.zhihu.com/equation?tex=q";}}i:76;s:77:" 取模的,因此要得到最终答案还需要一点数学技巧:选取 ";i:77;a:4:{s:3:"tag";s:3:"img";s:6:"option";N;s:8:"original";a:2:{i:0;s:5:"[IMG]";i:1;s:6:"[/IMG]";}s:8:"children";a:1:{i:0;s:35:"http://www.zhihu.com/equation?tex=n";}}i:78;s:23:" 个不同的大素数 ";i:79;a:4:{s:3:"tag";s:3:"img";s:6:"option";N;s:8:"original";a:2:{i:0;s:5:"[IMG]";i:1;s:6:"[/IMG]";}s:8:"children";a:1:{i:0;s:37:"http://www.zhihu.com/equation?tex=q_i";}}i:80;s:43:",重复上述过程,我们就得到了 ";i:81;a:4:{s:3:"tag";s:3:"img";s:6:"option";N;s:8:"original";a:2:{i:0;s:5:"[IMG]";i:1;s:6:"[/IMG]";}s:8:"children";a:1:{i:0;s:35:"http://www.zhihu.com/equation?tex=n";}}i:82;s:29:" 个数的乘积对不同的 ";i:83;a:4:{s:3:"tag";s:3:"img";s:6:"option";N;s:8:"original";a:2:{i:0;s:5:"[IMG]";i:1;s:6:"[/IMG]";}s:8:"children";a:1:{i:0;s:37:"http://www.zhihu.com/equation?tex=q_i";}}i:84;s:83:" 取模的值。用中国剩余定理,我们可以算出这个乘积对所有的 ";i:85;a:4:{s:3:"tag";s:3:"img";s:6:"option";N;s:8:"original";a:2:{i:0;s:5:"[IMG]";i:1;s:6:"[/IMG]";}s:8:"children";a:1:{i:0;s:37:"http://www.zhihu.com/equation?tex=q_i";}}i:86;s:95:" 乘积的模值。注意到后者大于前者,因此取模并不影响,该数字就是这 ";i:87;a:4:{s:3:"tag";s:3:"img";s:6:"option";N;s:8:"original";a:2:{i:0;s:5:"[IMG]";i:1;s:6:"[/IMG]";}s:8:"children";a:1:{i:0;s:35:"http://www.zhihu.com/equation?tex=n";}}i:88;s:23:" 个数的乘积,开 ";i:89;a:4:{s:3:"tag";s:3:"img";s:6:"option";N;s:8:"original";a:2:{i:0;s:5:"[IMG]";i:1;s:6:"[/IMG]";}s:8:"children";a:1:{i:0;s:35:"http://www.zhihu.com/equation?tex=n";}}i:90;s:92:" 次方即为答案。 关于可靠性只需要再加一个签名即可,不再赘述。 ";i:91;a:4:{s:3:"tag";s:1:"b";s:6:"option";N;s:8:"original";a:2:{i:0;s:3:"[B]";i:1;s:4:"[/B]";}s:8:"children";a:1:{i:0;s:12:"五、总结";}}i:92;s:677:" 这个看起来很简单的问题,深究起来竟然涉及如此多的密码学知识,连我都有些惊讶。这也是我们思考问题的方式:假设每个环节都有泄密或被篡改的可能,然后逐个去排除,让协议更加安全可靠。 第二部分第三个方案是一个很不错的方案,不仅泄露的信息最少,而且很容易类比到任意人数的情况。因此很容易想到在此基础上进行修正。而第四部分纯粹是我突然想到的,画蛇添足了。 事实上,问题本身是一个最简单的安全多方计算问题,有兴趣的朋友可以顺着这个关键词查阅相关的资料。 最后我想说,";i:93;a:4:{s:3:"tag";s:1:"b";s:6:"option";N;s:8:"original";a:2:{i:0;s:3:"[B]";i:1;s:4:"[/B]";}s:8:"children";a:1:{i:0;s:25:"密码学真的很好玩~";}}i:94;s:2:" ";i:95;a:4:{s:3:"tag";s:3:"url";s:6:"option";s:38:"http://www.zhihu.com/question/60042833";s:8:"original";a:2:{i:0;s:46:"[URL='http://www.zhihu.com/question/60042833']";i:1;s:6:"[/URL]";}s:8:"children";a:1:{i:0;s:12:"阅读原文";}}}, 1621686945, 1714293899
    Run Time: 0.001379

Included Files (108, XenForo Classes: 62)

  1. index.php
  2. library/XenForo/Autoloader.php
  3. library/XenForo/Application.php
  4. library/Zend/Registry.php
  5. library/Lgpl/utf8.php
  6. library/Zend/Config.php
  7. library/config.php
  8. library/XenForo/FrontController.php
  9. library/XenForo/Dependencies/Public.php
  10. library/XenForo/Dependencies/Abstract.php
  11. library/Zend/Controller/Request/Http.php
  12. library/Zend/Controller/Request/Abstract.php
  13. library/Zend/Uri.php
  14. library/Zend/Controller/Response/Http.php
  15. library/Zend/Controller/Response/Abstract.php
  16. library/XenForo/Model/DataRegistry.php
  17. library/XenForo/Model.php
  18. library/Zend/Db.php
  19. library/Zend/Db/Adapter/Mysqli.php
  20. library/Zend/Db/Adapter/Abstract.php
  21. library/Zend/Db/Select.php
  22. library/Zend/Db/Expr.php
  23. library/Zend/Db/Profiler.php
  24. library/Zend/Db/Statement/Mysqli.php
  25. library/Zend/Db/Statement.php
  26. library/Zend/Db/Statement/Interface.php
  27. library/Zend/Db/Profiler/Query.php
  28. library/XenForo/CodeEvent.php
  29. library/XenForo/Options.php
  30. library/XenForo/Link.php
  31. library/XenForo/Template/Helper/Core.php
  32. library/XenResource/Listener/Proxy.php
  33. library/XenGallery/Listener.php
  34. library/Brivium/BriviumHelper/EventListeners.php
  35. library/Brivium/BriviumHelper/1000271/EventListeners.php
  36. library/SV/RedisCache/Listener.php
  37. library/BestAnswer/Listener.php
  38. library/SV/RedisCache/XenForo/Model/DataRegistry.php
  39. library/Brivium/BriviumHelper/Model/ListenerClass.php
  40. library/Brivium/BriviumHelper/1000271/Model/ListenerClass.php
  41. library/XenForo/Router.php
  42. library/XenForo/Route/Filter.php
  43. library/XenForo/Route/Interface.php
  44. library/XenForo/Route/ResponseSuffix.php
  45. library/XenForo/Route/Prefix.php
  46. library/XenForo/Route/Prefix/Threads.php
  47. library/XenForo/RouteMatch.php
  48. library/XenForo/ControllerPublic/Thread.php
  49. library/XenForo/ControllerPublic/Abstract.php
  50. library/XenForo/Controller.php
  51. library/BestAnswer/ControllerPublic/Thread.php
  52. library/XenForo/Input.php
  53. library/XenForo/Session.php
  54. library/XenForo/Helper/Ip.php
  55. library/XenForo/Visitor.php
  56. library/XenForo/Model/User.php
  57. library/BestAnswer/Model/User.php
  58. library/XenResource/Listener/Proxy/ModelUser.php
  59. library/XenGallery/Model/User.php
  60. library/XenForo/Permission.php
  61. library/XenForo/Helper/Php.php
  62. library/XenForo/Phrase.php
  63. library/XenForo/Locale.php
  64. library/XenForo/ControllerHelper/ForumThreadPost.php
  65. library/XenForo/ControllerHelper/Abstract.php
  66. library/XenForo/Model/Thread.php
  67. library/SV/RedisCache/XenForo/Model/Thread.php
  68. library/BestAnswer/Model/Thread.php
  69. library/BestAnswer/Model/BestAnswer.php
  70. library/XenForo/Model/Forum.php
  71. library/XenForo/Helper/String.php
  72. library/XenForo/Model/Post.php
  73. library/FreddysHouse/SignatureOnce/Event/LoadClassModel.php
  74. library/BestAnswer/Model/Post.php
  75. library/FreddysHouse/SignatureOnce/Model/Post.php
  76. library/XenForo/Model/Attachment.php
  77. library/XenForo/Model/Node.php
  78. library/XenForo/Route/Prefix/Categories.php
  79. library/XenForo/Route/Prefix/Forums.php
  80. library/XenForo/ControllerResponse/View.php
  81. library/XenForo/ControllerResponse/Abstract.php
  82. library/XenForo/Helper/Cookie.php
  83. library/XenResource/Listener/Template.php
  84. library/XenForo/ViewRenderer/HtmlPublic.php
  85. library/XenForo/ViewRenderer/Abstract.php
  86. library/XenForo/Template/Public.php
  87. library/XenForo/Template/Abstract.php
  88. library/XenForo/ViewPublic/Thread/View.php
  89. library/XenForo/ViewPublic/Base.php
  90. library/XenForo/View.php
  91. library/XenForo/BbCode/Parser.php
  92. library/XenForo/BbCode/Formatter/Base.php
  93. library/XenForo/ViewPublic/Helper/Message.php
  94. library/XenForo/BbCode/TextWrapper.php
  95. library/WhoHasVisited/Listener.php
  96. library/XenForo/Route/Prefix/Members.php
  97. library/XenForo/Template/FileHandler.php
  98. library/XenForo/Helper/File.php
  99. internal_data/templates/S.1,L.7,thread_view.php
  100. library/Brivium/RMDownloadTracker/EventListener/Listener.php
  101. library/XenForo/Route/Prefix/Posts.php
  102. library/XenForo/Model/Avatar.php
  103. library/XenForo/Helper/Criteria.php
  104. library/XenForo/Debug.php
  105. internal_data/templates/S.1,L.7,PAGE_CONTAINER.php
  106. internal_data/templates/S.1,L.7,xengallery_tab_links.php
  107. internal_data/templates/S.1,L.7,resources_tab_links.php
  108. library/XenForo/ViewRenderer/Json.php